نتایج جستجو برای: authentication and non repudiation

تعداد نتایج: 17010313  

2013
G. VENKATESAN

Many security mechanisms for mobile communications have been introduced in the literature. Among these mechanisms, a simple authentication technique for use in the global mobility network (GLOMONET) is proposed. Specifically, the wireless medium introduces new opportunities for eavesdropping of wireless data communications. Anyone with the appropriate wireless receiver can eavesdrop and this ki...

Journal: :Computer Networks 2008
Minghui Shi Xuemin Shen Jon W. Mark Dongmei Zhao Yixin Jiang

In this paper, a framework of authentication and undeniable billing support for an agentbased roaming service in WLAN/cellular networks interworking networks is proposed. This framework circumvents the requirement of peer-to-peer roaming agreements to provide seamless roaming service between WLAN hotspots and cellular networks operated by independent wireless network service providers. Within t...

2010
Sanjive Tyagi Ajay Agarwal Ramveer Singh Radha Govind

The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present paper focus is enlightening the technique to secure data or message with authenticity and integrity. The security of communication is a crucial issue on World Wide Web (internet) and within organizations. It is about confidentiality, integrity and authentic...

Journal: :J. Inform. and Commun. Convergence Engineering 2014
Aparna Vegendla Hwajeong Seo Donggeon Lee Howon Kim

The wireless sensor networking standard DASH7 operates in low-power communication with a better transmission quality in active RFID networks. The DASH7 security standard supports public key cryptography. At present, the DASH7 standard uses the message authentication code in the network layer for authentication and integrity. However, its security standard is still in an incubation stage with re...

Journal: :CoRR 2014
Sanjay Majumder Sanjay Chakraborty Suman Das

Network & internet security is the burning question of today's world and they are deeply related to each other for secure successful data transmission. Network security approach is totally based on the concept of network security services. In this paper, a new system of network security service is implemented which is more secure than conventional network security services. This technique ...

Journal: :IACR Cryptology ePrint Archive 2013
Muhammad Qasim Saeed

A protocol for NFC mobile authentication and transaction is recently proposed by W. Chen et al. This protocol is used for micropayments, where the Mobile Network Operator (MNO) pays for its customers. The main advantage of this protocol is its compatibility with the existing GSM network. This paper suggests some improvements in this protocol from security point of view. As this protocol is used...

Journal: :Information Technology Journal 2007

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان - دانشکده زبانهای خارجی 1389

abstract the current study sets out 1) to investigate the strategic needs of iranian efl learners in reading literary and non-literary texts; 2) to shed some light on the differences between reading literary and non-literary texts; and 3) to specify the differences in the interaction of participants with texts while reading two literary subgenres ( i.e., short story and literary essays). to ...

2002
Steve Kremer Olivier Markowitch Jianying Zhou

With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Non-repudiation services must ensure that when Alice sends some information to Bob over a network, neither Alice nor Bob can deny having participated in a part or the whole of this communication. Therefore a non-repudiation protocol has to gen...

Journal: :CoRR 2007
Tirtha Shankar Das Vijay Harishchandra Mankar Subir Kumar Sarkar

In this paper, a new approach to Spread Spectrum (SS) watermarking technique is introduced. This problem is particularly interesting in the field of modern multimedia applications like internet when copyright protection of digital image is required. The approach exploits two-predecessor single attractor (TPSA) cellular automata (CA) suitability to work as efficient authentication function in wa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید